Supercharge Your Innovation With Domain-Expert AI Agents!

A Defensive Agent Approach to Improve Byzantine Robustness of Distributed Learning Systems

A Byzantine robustness and learning system technology, which is applied in the field of defensive agents to improve the Byzantine robustness of distributed learning systems, can solve problems such as disrupting the normal training process of classifiers, parameter update decision errors, and defense mechanism failures, etc., to achieve robustness. Improvement of stickiness, relief of impact, and noticeable effect

Active Publication Date: 2022-04-12
FUDAN UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to factors such as transmission errors and deliberate tampering, some working nodes in the distributed learning system may submit tampered gradients to the master node to induce the master node's gradient merging algorithm to be abnormal, resulting in wrong parameter update decisions and disrupting the normal operation of the classifier. The training process, which is often referred to as a Byzantine attack on distributed learning systems
Most of the existing Byzantine robustness improvement methods rely on the "majority voting mechanism" between gradients. Once most of the working nodes in the system experience Byzantine anomalies or are maliciously controlled, these defense mechanisms will fail and the distributed learning system will not be able to obtain orders. Satisfactory Byzantine Robustness

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Defensive Agent Approach to Improve Byzantine Robustness of Distributed Learning Systems
  • A Defensive Agent Approach to Improve Byzantine Robustness of Distributed Learning Systems
  • A Defensive Agent Approach to Improve Byzantine Robustness of Distributed Learning Systems

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] Such as figure 1 As shown, the present embodiment adopts the CIFAR-10 data set, and the method of the present embodiment promotes the classifier as a distributed learning with 50 working nodes of the deep convolutional neural network ResNet-18 for object recognition (very class task) Byzantine robustness of the system training process. This embodiment specifically includes:

[0033] Step 1. Initialization phase: Before the distributed system training starts, prepare the private small verification set on the master node and initialize the credibility vector of the adaptive credibility evaluation module.

[0034] (1.1) Prepare a small verification set: uniformly sample K random data samples from the CIFAR-10 training data set as a small verification set S. In this embodiment, the small verification set size K is selected as 10.

[0035] (1.2) Credibility vector initialization: initialize the credibility vector of the zero-time adaptive credibility evaluation module ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of distributed artificial intelligence, and specifically relates to a defense agent method for improving the Byzantine robustness of a distributed learning system. The present invention uses the adaptive credibility evaluation module based on the neural network structure to dynamically evaluate the credibility of each submission gradient, update the global classifier parameters maintained on the current master node, generate reward signals, and use the reward signals in reinforcement learning. Adjust the parameters of the adaptive credibility evaluation module under the framework; dynamically adjust the feasibility evaluation value of each working node during the training process, and alleviate the impact of the tampered gradient submitted by malicious working nodes on the system training process, so as to improve the distributed Byzantine robustness of learning systems. The present invention can be widely applied to various distributed deep learning systems, and improves the Byzantine robustness of the system. The security of the distributed training process of the artificial intelligence system has been significantly improved, especially when the proportion of malicious working nodes is greater than or equal to 50%.

Description

technical field [0001] The invention belongs to the technical field of distributed artificial intelligence, and in particular relates to a defense agent method for improving the Byzantine robustness of a distributed learning system. Background technique [0002] With the continuous development of deep learning technology, massive training data is being put into the training process of classifiers based on machine learning, and building classifiers on distributed platforms has gradually become a mainstream trend in the industry. However, due to factors such as transmission errors and deliberate tampering, some working nodes in the distributed learning system may submit tampered gradients to the master node to induce the master node's gradient merging algorithm to be abnormal, resulting in wrong parameter update decisions and disrupting the normal operation of the classifier. The training process, which is often referred to as a Byzantine attack on distributed learning systems...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/57G06K9/62G06N3/08G06N3/04
CPCG06F21/57G06N3/08G06N3/045G06F18/214G06F18/24
Inventor 杨珉张谧潘旭东
Owner FUDAN UNIV
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More